The security industry has undergone massive changes in the last 15 years, and in some cases it’s hard to imagine what things would be like had these events not taken place. Think of a world in which Google focuses on security and privacy and Microsoft never started Trustworthy Computing, and you get the idea.
[img_assist|nid=3418|title=|desc=|link=none|align=left|width=100|height=100]A group of researchers have discovered a
simple way to reveal the identity of a user based on his interactions
with social networks. The ‘deanonymization’ attack uses social network groups as well
as some traditional browser history-stealing tactics to narrow down and
find the user behind the browser. Read the full article. [Dark Reading]
[img_assist|nid=3410|title=|desc=|link=none|align=right|width=100|height=100]Adobe today shipped a patch for a critical vulnerability in its Download Manager utility, warning that hackers could exploit the issue to take full control of Windows computers.The vulnerability, discovered by Aviv Raff, could potentially allow an attacker to download and install unauthorized software onto a user’s system, Adobe said in an advisory.
[img_assist|nid=3407|title=|desc=|link=none|align=left|width=100|height=100]Intel is the latest U.S. corporation to acknowledge that it was
hacked in January in a sophisticated attack that occurred at the same
time that Google, Adobe and others were targeted. The giant California-based chip maker was rumored to have been among
some 34 companies that were targeted, but said on Tuesday there was no
evidence to tie its hack to the attack on Google and others. Read the full article. [Wired]
[img_assist|nid=3404|title=|desc=|link=none|align=right|width=127|height=87]Rutgers University researchers have demonstrated how rootkits can be a threat to smartphones sporting operating systems not much unlike those in full-blown computers. Read the full article. [Network World]
Criminals hid bank card-skimming devices inside gas pumps — in at least one case, even completely replacing the front panel of a pump — in a recent wave of attacks that demonstrate a more sophisticated, insidious method of stealing money from unsuspecting victims filling up their gas tanks.
[img_assist|nid=3399|title=|desc=|link=none|align=right|width=100|height=100]Users of Google’s Blogger, a free blog publishing tool, are the targets of the latest phishing email campaign. Read the full article. [Help Net Security]
[img_assist|nid=3396|title=|desc=|link=none|align=left|width=100|height=100]A New Hampshire-based IT consultancy lost nearly $100,000 this month
after thieves broke into the company’s bank accounts with the help of
10 co-conspirators across the United States. Read the full article. [KrebsonSecruity]
Securosis analysts Rich Mogull, Adrian Lane and Mike Rothman tackle the key themes for this year’s RSA 2010 conference — virtualization/cloud security, advanced persistent threats/cybersecurity and compliance.
T[img_assist|nid=3395|title=|desc=|link=none|align=right|width=100|height=100]he Federal Trade Commission today finally voiced concern about the long-known problem of data leaking into criminal hands via LimeWire, BearShare, Kazaa and dozens of other peer-to-peer (p2p) file sharing networks. The FTC put nearly 100 companies and agencies on notice that their employees appear to be regularly leaking large amounts of sensitive customer and employee data on popular peer-to-peer, or P2P, file-sharing networks. Read the full story [The Last Watchdog]